How To Manage Your Spam On Graymail On Pc Or Macodeo.Com



Similar documents
Protection for your account

Symantec Hosted Mail Security. Console and Spam Quarantine User Guide

Administration Guide Revision E. SaaS Protection

How To Use The Mail Control Console On A Pc Or Macbook (For A Macbook)

Creating a Content Group and assigning the Encrypt action to the Group.

SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Administration Guide Revision A. SaaS Protection

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

Administration Guide Revision E. Account Management. For SaaS and Web Security

Live Office. Personal Archive User Guide

Personal Archive User Guide

Personal Dashboard User Guide

Barracuda Spam Firewall User s Guide

Overview. Accessing the User Interface. Logging In. Resetting your Password

Spam Manager. User Guide

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc S. Winchester Blvd Campbell, CA

How To Manage Your Quarantine On A Blackberry.Com

ADP Secure Client User Guide

January 23, 2010 McAfee SaaS Continuity User Guide

MX LOGIC SPAM FILTERING

Barracuda Spam & Virus Firewall User's Guide 5.x

eprism Security Suite

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc S. Winchester Blvd Campbell, CA

Account and User Management Training Guide

Spambrella SaaS Encryption Enablement for Customers, Domains and Users Quick Start Guide

- Spam Filtering

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

What browsers can I use to view my mail?

Mimecast Personal Portal (MPP)

ModusMail Software Instructions.

Using Your New Webmail

eprism Security Suite

How does the Excalibur Technology SPAM & Virus Protection System work?

PureMessage for Microsoft Exchange Help. Product version: 4.0

TriCore Secure Web Gateway User Guide 1

Spam Manager. Quarantine Administrator Guide

Using Your New Webmail

More Details About Your Spam Digest & Dashboard

FILTERING FAQ

MailEnable Web Mail End User Manual V 2.x

Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header

ADP Secure Client User Guide

Migration Manual (For Outlook Express 6)

Migration Manual (For Outlook 2010)

-- Reading and Printing

eprism Security Suite

Webmail Instruction Guide

Overview of Registered Envelopes. Registered Envelope Notification Message

About Archiving for Microsoft Exchange Server

Managing Spam in & More Introduction Spam Detector Block Sender Filters

SonicWALL Security. User Guide. Version 4.6

Nationstar Mortgage Secure Client User Guide

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.

Using Webmail. Document Updated: 9/08. Technical Manual: User Guide. The Webmail Window. Displaying and Hiding the Full Header.

PureMessage for Microsoft Exchange Help. Product version: 3.1

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

Barracuda Spam Firewall User s Guide

Secure Message Center User Guide

Setting up Microsoft Office 365

Setting up Microsoft Office 365

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) , option 1. Access Methods:

Barracuda Spam Firewall User 's Guide 6.x

Kerio Connect. Kerio Connect Client. Kerio Technologies

Using Outlook WebAccess

Outlook Web Access Tipsheets

SmarterMail User Guide

Getting Started Guide Unix Platform

Gordon State College. Spam Firewall. User Guide

For detailed information on these options and more, please read the appropriately titled topic in this help document.

The online environment

Cloud Services. Anti-Spam. Admin Guide

BCSD WebMail Documentation

Service Launch Guide (US Customer) SEG Filtering

Searching your Archive in Outlook (Normal)

User Guide for Kelani Mail

How to Use Red Condor Spam Filtering

WEBMAIL USER MANUAL AN INTRODUCTION TO WLINK WEBMAIL. Table of content:

How to Use the Greymail Spam Filter

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide

PANDA CLOUD PROTECTION / Administrator s Manual / 1

Dealer Services. Administrator Guide. DealerMail. *343087* September 15,

Setup Guide Revision B. McAfee SaaS Archiving for Microsoft Exchange Server 2010

Spam Manager User Guide. Boundary Defense for Anti-Spam End User Guide

Using the Barracuda Spam Firewall to Filter Your s

700 Fox Glen Barrington, Illinois ph: [847] fx: [847] Webmail System User Guide

HOSTED EXCHANGE ADVANCED SECURITY. Hosted Exchange Advanced Security Feb 2013

Filtering Service. Secure Gateway (SEG) Service Administrative Guides. Revised February 2013

Welcome to HomeTown Bank s Secure ! User Guide

Barracuda Security Service User Guide

WEB QUARANTINE USER GUIDE VERSION 4.3

EasyMail Setup. User Guide. Issue 3 September Welcome to AT&T Website Solutions

Webmail User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header. Printing an . Composing a New

Connecting to LUA s webmail

Stewart Secure User Guide. March 13, 2015

Message Archiving User Guide

Control Center For one_business

Western University Spam Firewall User s Guide

Transcription:

User Guide Revision E SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and fraudulent emails before they ever reach your inbox. When spam is identified, the policies configured for your account determine whether the email is delivered, blocked, or quarantined for further review. Using the Control Console to manage your account As an Email Protection user, you can use the Control Console web application to view and manage your quarantined spam, configure your preferences, create allowed and blocked senders lists, and access other optional tools. Preferences Configure your Control Console and Email Protection service settings. Aliases Add alias email addresses that are associated with your user account. Quarantine Review suspicious email messages and decide whether or not they are spam. Email Continuity When configured for your account, Email Continuity provides a web-based email client that you can use to send and receive email in the event of an outage. Allowed Senders Create a list of email address that are always accepted by the spam filter. Blocked Senders Create a list of email addressed that are always denied by the spam filter. Archived Messages When configured for your account, copies of your email are stored in an email archive. This tool allows you to search for and view your archived messages. For more information, see the SaaS Email Archiving User Guide. 1

Accessing the Control Console Sign into the Control Console The Control Console is the primary user interface with which you manage your quarantined email, email encryption, Web Protection display settings, and Email Archiving. You can manage quarantined messages by clicking the links in quarantine messages you receive, but to manage any other aspects of your account, you must sign in. The first time you try to access the Control Console, you must define a password that you will use thereafter to sign in or use one of the following: Your corporate network password A password given to you by your administrator because some other form of remote authentication is being used After you have signed into the Control Console, you can change your password at any time. 1 Open a browser on your computer and enter the URL for the Control Console. If you don t have the URL, contact your administrator. 2 On the Control Console Sign in page, from the Language drop-down list, select a language in which you wish to view the Sign in page and receive your Spam Report emails. 3 Enter your email address and password. If you don t have the email address you should enter, contact your administrator. If you don t have a password, click the Forgot your password or need to create a password? link. If you make five consecutive unsuccessful attempts to log in within a 30-minute period, your account is locked. In this case, you can wait 30 minutes and try to log in again. You can also reset your password or contact your administrator to reset your password immediately. 4 Click Sign in. If you have not previously entered an answer to a security question, the Security Question page is displayed. The answer to the security question is used to validate you, the user, if you forget your password and request a reminder or reset. If you don't answer a security question, this page appears the next time you log in. You can later change your security question and/or security answer on the Preferences page of your user account. 5 Select a security question and type the answer. Your answer is not case sensitive. 6 Click OK. The Message Quarantine page of the Control Console is displayed. Reset your password from the Sign in page If you forget your password or want to reset it as a precaution, you can do so from the Sign In page. This capability might not be available if your company s login authentication process uses a central password repository with LDAP, IMAP, or POP3 programs. 2

1 On the Sign in page, click the Forgot your password or need to create a password? link. The Change Password page is displayed. 2 In the Username field, type your email address. 3 Select Email password information to me. If you don t have the email address you should enter, contact your administrator. If you don t have a password, click the Forgot your password or need to create a password? link. If you make five consecutive unsuccessful attempts to log in within a 30-minute period, your account is locked. In this case, you can wait 30 minutes and try to log in again. You can also reset your password or contact your administrator to reset your password immediately. 4 Click Next. You will receive an email momentarily with the subject line Control Console Login Information. Continue with step 5. 5 Open the email message. 6 Click the link in the email. The link is active for only a limited time after the email is sent (typically 60 minutes). If the link expires, you must repeat this procedure starting at step 1. 7 If you previously selected a security question, the security question is displayed. If you had not previously selected a security question, select a question from the Security Question drop-down list. 8 In the Security Answer field, type the answer to the question. 9 If you need to change the security question or answer, click Change by the Security Question field. You must answer this question if you forget your password and need to reset it. The Security Question and Security Answer fields are displayed. Select a question from the Security Question drop-down list. 10 In the Password field, type a password. The password must comply with the following rules: Length must be a minimum of eight characters. Alpha, numeric, and special character types are allowed. There must be at least one character that differs in character type (alpha, numeric, or special) from the majority of characters. Thus, if the password contains mostly alpha characters, then at least one character must be either a special character or numeric. For example, majordude is invalid, but majordude9 is valid. Spaces are not allowed. Passwords are case sensitive (for example, Password, password, and PASSword would be different passwords). 3

Reset your password in the Control Console After you access the Control Console, you can change your password without receiving an email. This capability might not be available if your company s authentication process uses a central password repository with LDAP, IMAP, or POP3 programs. In addition, your service might be administered so that users cannot change their password. 1 Click Preferences. 2 From the Time Zone drop-down list, select your time zone. 3 Next to the Password field, click Change. The Password and Confirm Password fields are displayed. Type the new password in the fields. 4 If you need to change the security question or answer, click Change by the Security Question field. You must answer this question if you forget your password and need to reset it. The Security Question and Security Answer fields are displayed. From the Security Question drop-down list, select a question. In the Security Answer field, type an answer. Select a question from the Security Question drop-down list. Type the answer to the question in the Security Answer field. 5 Click Apply. Your password is set. You must use this password the next time you sign in to the Control Console. Setting preferences Set your time zone, language, and entries per page In the Preferences tab, you can use the options under general settings to configure your default time zone and language. You can also configure the number of items you see per page in list views throughout the Control Console. For option definitions, click Help in the interface. 1 Select Preferences. 2 From the Time Zone drop-down list, select a location or city near you. Each time zone in the list shows the time offset from Greenwich Mean Time (GMT). For example GMT -07:00 indicates that the time zone is seven hours behind GMT. Spam Reports and processed emails use the time zone of the data center where Email Protection is running instead of your local time zone. As a result, your Spam Reports can contain timestamp information that doesn't match the time zone you select here. For example, an email sent on Tuesday from Japan to New York is processed and quarantined in Denver where it is still late on Monday. This email is included in Monday's spam report even though the original activity took place on Tuesday. 4

3 From the Language drop-down list, select a language. 4 From the Entries Per Page drop-down list, select a value. 5 Click Apply to save your settings. Manage email filters and spam reporting You can use the Preferences page to change some aspects of your email spam filtering and spam reporting. Some Email Protection features are optional and may be unavailable if your Email Protection Administrator disabled them. These settings affect all your associated email addresses, including your primary address and all alias email addresses. For option definitions, click Help in the interface. 1 Click Preferences. 2 Complete the fields in the Email Protection section. 3 Click Apply. Schedule spam reports Use the schedule and frequency options in the Preferences tab to schedule the delivery of spam reports. For option definitions, click Help in the interface. 1 Select the Preferences tab. Administrators can select My Account Preferences. 2 Under Email Protection Settings, complete the scheduling options for spam reports. Schedule and Frequency Deselect Use policy defaults. Frequency Select one or more days of the week. Deliver reports by Select the time of day for Report 1 and Report 2. Select Skip if you do not want to receive a report. 3 Click Apply. Preferences tab The Preferences tab allows you to configure settings for your account including the default time zone, display language, and the number of entries per page. You can also configure settings for specific application features including spam filtering and spam reporting. Some features may be unavailable if your administrator disabled them. These settings affect all your associated email addresses, including your primary and all alias addresses. 5

Table 1 Preferences tab field descriptions Option Password Security Question Time Zone Definition While a user can change his or her own password, only a Customer Administrator can set the password of another user. In addition, the ability to change passwords might not be available if: Your company authentication process uses a central password repository. Your service is administered so that the ability to change passwords is unavailable. If you use remote LDAP, IMAP, or POP3 authentication for users, the password you reset will normally be replaced with the password on the authentication server the next time the Control Console synchronizes with that server. However, if the user is a Customer Administrator or Domain Administrator, and that user is not also defined in the authentication server, the authentication synchronization will not affect the password you reset for that user. At the Password field, click Change. Type a new password in the Password field. Type a new password in the Confirm Password field. Password rules are the following: There must be a minimum of eight characters. Alpha, numeric, and special character types are allowed. There must be at least one character that differs in character type (alpha, numeric, or special) from the majority of characters. Thus, if the password contains mostly alpha characters, then at least one character must be either a special character or numeric. For example, majordude is invalid, but majordude9 is valid. The password cannot contain any spaces. Both uppercase and lowercase letters are allowed. Passwords are case sensitive (for example, Password, password, and PASSword would be different passwords) Any of the following symbols are allowed: ( ) ` ~! @ # $ % ^ & * - + = \ { } [ ] : ; " ' < >,.? / You must answer the security question if you forget your password and need to reset it. The Security Question field is displayed only when you are setting the preferences of your own account. To change the security question or answer, click Change. The Security Question and Security Answer fields are displayed. Select a question from the Security Question drop-down list. Type the answer to the question in the Security Answer field. You can designate the time zone that is used to time stamp the page display when you sign on to the Control Console. Note: The time and date of your Spam Reports and the processed emails will be controlled by the time zone designated by the data center where Email Protection is running. If the time zone that you designate in this field differs from the data center, you may have to select a date different from your current local date in the Control Console to view the data. For example, if your local time zone is 7 hours behind of the time zone of the data center, you may have to select the next day ("tomorrow") in the calendar to view additional emails that may be on your Message Quarantine page. This would be necessary because the data center will roll to the next day 7 hours before your local time. During that 7 hours, the emails processed by the data center will be posted to "tomorrow" relative to your local time and date. Alternatively, you can select to view all the emails and thus see all quarantined emails on the Message Quarantine page. 6

Table 1 Preferences tab field descriptions (continued) Option Language Entries Per Page Definition This option allows you to select the language in which you want your Spam Report to display. There are eighteen language options: English French German Italian Japanese Spanish Chinese Simplified Chinese Traditional Korean Brazilian Portuguese Dutch Danish Finnish Norwegian Portuguese Swedish Russian Turkish From the Entries per page drop-down list, select the number of items to be displayed in lists on the Control Console, for example, quarantined email lists for users and Email Protection log reports for administrators. The default list length is 25. Table 2 Email Protection Settings field definitions Field Spam Filtering Spam Actions Medium Spam Action High Spam Action Definition Select Enable to filter your messages for spam. Select Use policy defaults to use the default spam actions. Deselect to customize Medium Spam, High Spam, and Graymail Spam actions. Specifies the default action for spam messages that have a medium likelihood. Prepend "[SPAM]" to message subject The subject line of the email has the phrase "[SPAM]" added to the beginning of the subject text and the email is sent to you. Quarantine the message The email is added to your spam quarantine and is not sent to you. The email is reported in your Spam Report. Deny delivery The email is blocked automatically. Do nothing The email is forwarded to you with no processing applied. Specifies the default action for spam messages that have a high likelihood. Prepend "[SPAM]" to message subject The subject line of the email has the phrase "[SPAM]" added to the beginning of the subject text and the email is sent to you. Quarantine the message The email is added to your spam quarantine and is not sent to you. The email is reported in your Spam Report. Deny delivery The email is blocked automatically. Do nothing The email is forwarded to you with no processing applied. 7

Table 2 Email Protection Settings field definitions (continued) Field Graymail Spam Action Spam Report Schedule and Frequency Frequency Deliver Reports by Format Type Spam Report Alternate Delivery Address Definition Specifies the default action for graymail spam messages. Tag subject with "[GRAYMAIL]" The subject line of the email has the phrase "[GRAYMAIL]" added to the beginning of the subject text and the email is sent to you. Quarantine the message The email is added to your spam quarantine and is not sent to you. The email is reported in your Spam Report. Deny delivery The email is blocked automatically. Do nothing The email is forwarded to you with no processing applied. Allow Always allow graymail messages. Select Enable to receive spam reports. Select Use policy defaults to use the default spam report settings. Deselect to customize Frequency and Deliver reports by settings for spam reports. Specifies how often you receive spam reports. Select on or more days of the week. Specifies the time of day you would like to receive your reports. You have the option of receiving one or two reports per day. Specifies the format of the email, Plain text or HTML. Specifies the content of the report: New items since last report All quarantined items Summary Specifies an alternate email address that allows you to forward your Spam Report to a different address. The address must be provisioned in the system within one of your domains. Forwarding your Spam Report allows the recipient to have full access to your Control Console account. Be sure to use a trusted address. Table 3 Email Encryption Settings field definitions Field Message Delivery Method Definition From the drop-down list, select an option for delivering encrypted mail: Encryption Console: Store encrypted message content on encryption server. My Inbox: Store encrypted message content in email client. Table 4 Preferences tab toolbar options Option Apply Reset Definition Click Apply to save your changes. Click Reset to undo changes and restore your previously saved settings. 8

Aliases The Aliases tab allows you to configure alias email addresses that are associated with your user account. The purpose of alias email addresses is the following: Consolidate emails received for multiple addresses into a single set of quarantine areas (Virus, Spam, Content, and Attachments) Have a single Spam Report sent to the user for all quarantined spam emails. The Spam Report and any emails released from any quarantine are sent to the primary email address Have the emails received for the alias email addresses be filtered using the same configurations defined for the primary email address If the domain has alias domain names associated with it, additional alias email addresses using the prefix from the new alias email address will be created automatically for all the alias domain names. These additional alias email addresses cannot be edited individually and can be deleted only by deleting the relevant alias domain name from the domain. If an existing user account is defined as an alias email address, the user-level configurations for the existing user account will be deleted after the changes are saved in this window (for example, user-level policy configurations, Allowed Sender list and Blocked Sender list, etc.). Quarantine data for the existing user account will be merged into the quarantine data for the primary email address to which it is being associated as an alias email address. Thereafter, the new alias email address will use the configurations defined for the primary email address. If your role is as a User, Enterprise Domain Administrator, Quarantine Manager or Reports Manager, you cannot configure alias email addresses for other users. Add alias addresses To allow the Control Console to apply protection or archiving services to an alias email address, you must add the alias address to the Control Console and associate it with your primary email address. Up to five aliases can be created per user, depending on your company s configuration. If your company is using Intelligent Routing, you can also enter public domain addresses. 1 Click Aliases. 2 In the User Alias Address section, in the blank field that is followed by the @ sign and domain name, type the user's handle, or name, portion of the alias address. 3 From the drop-down list that follows the User Alias Address field, select the domain of the user address. 4 Click New. The address is listed in the User Alias Address section. 5 Click Apply. 9

The address is listed in the Domain Alias section for the primary domain and for any domain aliases that might be defined. An authorization email is sent to the added alias email address. The email contains a hyperlink, I authorize this request, that you must click to authorize the use of the alias email address. This step confirms that you have the right to change the email address to be associated as an alias to your primary email address. After the link is clicked in the authorization email, you are returned to the Aliases tab in the Control Console. The alias email address is authorized and associated with the primary email address. If the alias email address had previously been a primary email address, its user configurations are discarded and the new primary email address configurations are applied. Thereafter, the alias email address quarantine information will be combined with the primary email address and it will be controlled by the user configuration for the primary email address. Your configuration settings (for example, allow and deny lists) are transferred to the selected primary email address. The Spam Quarantine Report and any emails released from quarantine will be sent to the primary email address. Delete an alias address Delete an alias address that has been deleted from your email server or is no longer in use. You cannot delete a primary email address or an alias domain email address that was created automatically when an alias domain name was defined. If the email address that you want to delete is the primary email address, you must convert the primary address to an alias email address first. 1 Click Aliases. 2 Select the Delete checkbox next to the alias email address that you want to delete. 3 Click Apply. The alias email address is deleted immediately. Email Protection also removes the alias address s association with the primary email address. However, if you continue to receive email to the deleted address, Email Protection might recreate the email address as a primary email address with default user configurations, depending on system configurations. Quarantine The quarantine feature in Email Protection allows you to review suspicious email messages and determine whether or not they are spam. 10

Message Quarantine window The Message Quarantine window lists all of the quarantined spam messages for the account of the user currently logged on. Table 5 Message Quarantineoption definitions Option "View all quarantined messages" Sent To: Release Always Allow Always Deny Delete View Message Quarantine list Definition Specifies the date range for messages displayed in the Message Quarantine tab. Select to view messages for a specific day. Specifies the email addresses displayed in the Message Quarantine tab. Click to release the selected messages. Click to add the selected senders to the Allow list and release the messages (applies to spam messages only). Click to block the selected senders. Click to delete the selected messages. Click to view a message in the Safe Message View tab. Date Displays the date of the message. From Displays the from email address of the message. Subject Displays the subject of the message. Score Displays the quarantine score of the message. Size Displays the size of the message. Safe Message View The Safe Message View window provides more information about the quarantined message you have selected. You can also view the message content when policy settings Safe Message View is enabled. Table 6 Safe Message View Option Release Delete Always Allow for User Always Deny Definition Click to release a selected message from the quarantine list and have it moved to your email inbox. Click to delete a selected message from the quarantine list. Click to release messages through to the email recipients. All senders' email addresses are added to the recipient's Allow List. All future messages from the senders will no longer be quarantined. Click to block messages to the email recipients. Email Continuity Email Continuity provides a comprehensive managed disaster recovery service that protects your email traffic during a network outage. When active, users and administrators can view, send, and manage their email using the online interface while the service stores all inbound and outbound mail activity in the cloud. Afterwards, when connectivity is restored, the service synchronizes your email with your email servers and normal email use can resume. 11

Email Continuity features and limitations You can use most of the features of a standard web email client during an outage. Table 7 Email Continuity features and limitations Email features... That you can use during an outage That are unavailable during an outage That may be different from your standard email client Description Standard email options. Attach files Search messages Cannot change your From: email address. No access to your Global Address List or Personal Contact List. These Distribution Lists are on the corporate server, and during an outage, the corporate server is not available. No Spell Check. No Drafts Folder. No "Check names" functionality to verify email address prior to sending. Cannot search for text in the body of a message. You must separate multiple email addresses with commas, no spaces after the comma. You must enter a fully qualified email address in the To: field when composing a new message. If you have opened several messages, a tab for each message will appear. Messages deleted in Email Continuity are not permanently deleted. Once your email outage is over, all email activity is synchronized with your organization's email server(s), which handles final message disposition. Email Continuity When Disaster Recovery is active, you can access your email from the console. Use these tools to receive emails, reply to messages, view attachments, and search available folders. Table 8 Criteria Option Search Reset Mail Folders Search for Mail Definitions Click to run a search in the selected mail folder using your selected criteria and dates. Click to reset the search criteria values. Select a folder to view your messages and search for mail. Inbox Click to view your inbox. Deleted Items Click to view your deleted mail. Sent Items Click to view your sent items. Select to run a new search. Criteria Enter a string to search for values in the To, From, and Subject fields. Start Date Enter or select a date value. End Date Enter or select a date value. 12

Table 9 Email Continuity Option Inbox Deleted Items Definitions New Click to compose a new email. Open Click to open the selected email in a new tab. Preview Click to view the selected email in the preview panel. Select the location of the preview panel, or click the button to cycle through the options. Bottom View the message on the bottom of the tab. Right View the message on the right of the tab. Hide Hide the preview. Reply Click to write a reply to the sender of the selected email. Reply All Click to write a reply to the sender and all recipients of the selected email. Forward Click to forward the selected email. Delete Click to delete the selected email and move it to the Deleted Items folder. Actions Select an action. Mark as read Click to select messages as read. Mark as unread Click to select messages as unread. Print Click to print the selected email. Refresh Click to refresh the list of the email messages. Open Click to open the selected email in a new tab. Preview Click to view the selected email in the preview panel. Select the location of the preview panel, or click the button to cycle through the options. Bottom View the message on the bottom of the tab. Right View the message on the right of the tab. Hide Hide the preview. Reply Click to write a reply to the sender of the selected email. Reply All Click to write a reply to the sender and all recipients of the selected email. Forward Click to forward the selected email. Undelete Click to undelete the selected email and move it to the Inbox folder. Actions Select an action. Mark as read Click to select messages as read. Mark as unread Click to select messages as unread. Print Click to print the selected email. Refresh Click to refresh the list of the email messages. 13

Table 9 Email Continuity (continued) Option Sent Items Preview panel Definitions Open Click to open the selected email in a new tab. Preview Click to view the selected email in the preview panel. Select the location of the preview panel, or click the button to cycle through the options. Bottom View the message on the bottom of the tab. Right View the message on the right of the tab. Hide Hide the preview. Reply Click to write a reply to the sender of the selected email. Reply All Click to write a reply to the sender and all recipients of the selected email. Forward Click to forward the selected email. Print Click to print the selected email. Refresh Click to refresh the list of the email messages. Open Click to open the selected email in a new tab. Reply Click to write a reply to the sender of the selected email. Reply All Click to write a reply to the sender and all recipients of the selected email. Forward Click to forward the selected email. Delete Click to delete the selected email and move it to the Deleted Items folder. Actions Select an action. Mark as read Click to select messages as read. Mark as unread Click to select messages as unread. Print Click to print the selected email. Show Headers/Hide Headers Click to show or hide email headers. 14

Table 9 Email Continuity (continued) Option Opened message tab New Message Definitions Reply Click to write a reply to the sender of the selected email. Reply All Click to write a reply to the sender and all recipients of the selected email. Forward Click to forward the selected email. Print Click to print the selected email. Show Headers/Hide Headers Click to show or hide email headers. Send Click to send the message. Attach Click to attach files to the email. Switch to Plain Text/Switch to HTML Click to select the message format. Plain text use text-only format. HTML use HTML WYSIWYG tool to format the message. From: Select the from address. To: Enter one or more email addresses. Cc: Enter one or more Cc email addresses. Bcc: Enter one or more Bcc email addresses. Subject: Enter the subject text. Attachment: Select a file attachment. A new Attachment field displays each time you click Attach and add the file. Delete icon Click to delete the attachment. Message body Enter the message body. Allowing or blocking email from senders You can define lists of senders whose email addresses either will always be accepted without spam filtering (Allowed Sender List) or will never be accepted for delivery (Blocked Sender List). Types of spam to block Two basic definitions of spam can help you determine whether a sender address should be added to the Blocked Senders list. Unwanted emails received from recognized senders For example, a salesperson for a company may be sending you unwanted emails. In this scenario, it is unlikely that the sender address will be changed often by the spammer, so this type of address is a good candidate to be added to Blocked Senders list. Unwanted emails containing questionable or offensive content sent by senders deliberately attempting to bypass blacklisting and content filtering rules For example, emails from a sender might contain a fraudulent money-making offer or offensive sexual content. In this scenario, these spammers often change their email addresses, email content, etc., in an attempt to bypass any blacklist filtering. This type of address is not a good candidate to be added to the Blocked Senders list because the denial is effective for only a brief time. 15

Your Allowed Senders and Blocked Senders lists versus allow or deny Lists in your groups policy Your Email Protection administrator can define Allow and Deny lists as part of the policy for your group. In this case, the settings made by the administrator might take precedence and be applied before your Allowed Senders or Blocked Senders settings. Email that contains viruses, attachment violations, or content violations might also be denied or quarantined based on those violations, regardless of your allow list. Also, emails that have been quarantined by Email Protection might not need to be added to Blocked lists because they are already being blocked from entering your email network. Add senders to the allowed list You can define lists of senders whose email addresses are always accepted without spam filtering (Allowed Senders list). Before you begin The maximum number of email addresses and domain names a user can include in a senders list is 300. Any duplicate or invalid email addresses or domain names are discarded automatically. However, an administrator can add up to 1000 addresses on behalf of a user by selecting Account Management Users, selecting a user, and selecting Email Protection. The administrator can then select a senders list to add addresses to allow or block. You can add senders using the Message Quarantine tab or the Allowed Senders tab. Other email policy configurations in the system might block emails from addresses in your Allowed Senders list. In this case, emails from these addresses will not be received. 1 If necessary, click Allowed Senders. 2 For each domain or sender you want to add, perform these steps: a In the New field, enter a sender address. The following values are allowed in list entries: Domain Name Qualified domain name (for example, xyz.com) or subdomains (for example, *@*.xyz.com) allows emails from any subdomain of the XYZ domain, such as user@abc.xyz.com). If you want to allow all emails from this domain, then use this option instead of typing in each email address associated with the domain Sender Address Complete email address (for example, user@xyz.com) or partial address (for example, user*@xyz.com or *@xyz.com) b Click New. The entry is moved to the sender list. 3 Click Apply. Upload a list of allowed senders You can create a file containing a list of senders and upload that list to the Allowed Senders page. For option definitions, click Help in the interface. 16

1 Create the file with the list of senders. 2 Select Allowed Senders. 3 Click Browse for the Allowed Senders List field. 4 Find the file on your computer and click Upload. 5 Click Apply. Remove senders from the allowed senders list You can remove one or more senders from the list using the delete feature. Emails from these senders are again subject to ordinary filtering policies. For option definitions, click Help in the interface. 1 Select Allowed Senders. 2 Select the Delete checkbox for each sender you want to remove from the list. To select all users on the page at one time: 1 Select the first user on the page. 2 Press and hold Shift+Ctrl. 3 Select the last user on the page. 3 Click Apply. Add senders to the blocked list You can define lists of senders whose email addresses will never be accepted for delivery (Blocked Senders list). Before you begin The maximum number of email addresses and domain names a user can include in a senders list is 300. Any duplicate or invalid email addresses or domain names are discarded automatically. However, an administrator can add up to 1000 addresses on behalf of a user by selecting Account Management Users, selecting a user, and selecting Email Protection. The administrator can then select a senders list to add addresses to allow or block. You can add senders using the Message Quarantine tab or using the Blocked Senders tab. A common spamming technique is to change the sender email address often or even hijack a user's email address to send spam. The Blocked Senders list might not prevent future spam emails from these spammers. The Blocked Senders list primarily is used to block emails from unwanted senders who consistently send from the same address (for example, unwanted sales emails from a known company). 1 If necessary, click Blocked Senders. 2 For each domain or sender you want to add, perform these steps: a In the New field, enter a sender address. 17

The following values are allowed in list entries: Domain Name Qualified domain name (for example, xyz.com) or subdomains (for example, *@*.xyz.com) allows emails from any subdomain of the XYZ domain, such as user@abc.xyz.com). If you want to allow all emails from this domain, then use this option instead of typing in each email address associated with the domain Sender Address Complete email address (for example, user@xyz.com) or partial address (for example, user*@xyz.com or *@xyz.com) b Click New. The entry is moved to the sender list. 3 Click Apply. Upload a list of blocked senders You can create a file containing a list of senders and upload that list to the Blocked Senders page. For option definitions, click Help in the interface. 1 Create the file with the list of senders. 2 Select Blocked Senders. 3 Click Browse for the Blocked Senders List field. 4 Find the file on your computer and click Upload. 5 Click Apply. Remove senders from the blocked senders list You can remove one or more senders from the list using the delete feature. Emails from these senders are again subject to ordinary filtering policies. For option definitions, click Help in the interface. 1 Click Blocked Senders. 2 Select the Delete checkbox for each sender you want to remove from the list. To select all users on the page at one time: 1 Select the first user on the page. 2 Press and hold Shift+Ctrl. 3 Select the last user on the page. 3 Click Apply. 18

Copyright 2015 McAfee, Inc. www.intelsecurity.com Intel and the Intel logo are trademarks/registered trademarks of Intel Corporation. McAfee and the McAfee logo are trademarks/ registered trademarks of McAfee, Inc. Other names and brands may be claimed as the property of others. SAAS- EDS- UG-8.4.0 E00 19